Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

2,641 views

Published on

Rod Beckstrom's keynote address slides for BlackHat Las Vegas 2009. To see presentation, visit YouTube.com or http://tinyurl.com/c76r97. Presentation includes global dimensions of cyber including strategy, game theory, economics, IP protocols, etc. Is intended to be a good overview of topic. For a review of presentation see TechInsider: http://tinyurl.com/cbvlpx.

Published in: Technology
  • Be the first to comment

2008 Black Hat Cybersecurity Keynote- Rod Beckstrom, Director NCSC, DHS

  1. 1. Black Hat Black Hat Rod Beckstrom Director
  2. 2. WIRED Black Hat Rod Beckstrom Director
  3. 3. The Prisoners Dilemma
  4. 5. Insider threats and hackers…
  5. 7. Who reengineered the system?
  6. 9. A great challenge today Let’s work together to Create something new
  7. 10. Where do we want to go with this system? What is the end state we seek?
  8. 11. Slight problem… We don’t know the rules
  9. 13. Physics of networking? Economics of networks? Economics of security? Risk management?
  10. 14. Economics of Security
  11. 15. where C = total cost S = cost of security L = expected cost of loss Economics of Security MINIMIZE C = S + L
  12. 16. Loss $ Security $ Economics of Security
  13. 17. Loss $ Security $ Economics of Security
  14. 18. IPV6, BGP, DNS, SMS/IP, POTS … Economics of Protocols
  15. 19. Loss $ Security $ Economics of Protocols Better Protocols Drive Loss Function Down
  16. 20. Privacy/Security/Convenience Economics of Privacy
  17. 21. Cyber democracy Cyber governance Cyber quarantines Cyber justice Cyber diplomacy New Cyber Frontiers
  18. 22. The Prisoners Dilemma
  19. 23. The Prisoners Dilemma W/W W/L L/W W/W L/L
  20. 24. The Prisoners Dilemma W/W W/L L/W W/W L/L
  21. 25. The Prisoners Dilemma W/W W/L L/W W/W L/L
  22. 26. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  23. 27. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  24. 28. Iterated Prisoners Dilemma W/W W/L L/W W/W L/L 200 X
  25. 29. E Pluribus Unum
  26. 30. Constitutional code New cyber rules New economics New protocols Develop cyber diplomacy… Global collaboration… Summary
  27. 31. Where do we wish to plant our flag in cyberspace?

×